ssh.c 18.5 KB
Newer Older
Brad Morgan committed
1 2 3 4 5 6 7
/*
 * Copyright (C) the libgit2 contributors. All rights reserved.
 *
 * This file is part of libgit2, distributed under the GNU GPL v2 with
 * a Linking Exception. For full terms see the included COPYING file.
 */

8 9 10 11
#ifdef GIT_SSH
#include <libssh2.h>
#endif

Brad Morgan committed
12 13 14
#include "git2.h"
#include "buffer.h"
#include "netops.h"
Brad Morgan committed
15
#include "smart.h"
16
#include "cred.h"
17
#include "socket_stream.h"
Brad Morgan committed
18

19 20
#ifdef GIT_SSH

Brad Morgan committed
21 22
#define OWNING_SUBTRANSPORT(s) ((ssh_subtransport *)(s)->parent.subtransport)

Brad Morgan committed
23
static const char prefix_ssh[] = "ssh://";
Brad Morgan committed
24 25 26 27 28
static const char cmd_uploadpack[] = "git-upload-pack";
static const char cmd_receivepack[] = "git-receive-pack";

typedef struct {
	git_smart_subtransport_stream parent;
29
	git_stream *io;
Brad Morgan committed
30 31
	LIBSSH2_SESSION *session;
	LIBSSH2_CHANNEL *channel;
Brad Morgan committed
32 33 34 35 36 37 38
	const char *cmd;
	char *url;
	unsigned sent_command : 1;
} ssh_stream;

typedef struct {
	git_smart_subtransport parent;
Brad Morgan committed
39
	transport_smart *owner;
Brad Morgan committed
40
	ssh_stream *current_stream;
Brad Morgan committed
41
	git_cred *cred;
42 43
	char *cmd_uploadpack;
	char *cmd_receivepack;
Brad Morgan committed
44 45
} ssh_subtransport;

46
static int list_auth_methods(int *out, LIBSSH2_SESSION *session, const char *username);
47

48 49 50 51 52 53 54 55
static void ssh_error(LIBSSH2_SESSION *session, const char *errmsg)
{
	char *ssherr;
	libssh2_session_last_error(session, &ssherr, NULL, 0);

	giterr_set(GITERR_SSH, "%s: %s", errmsg, ssherr);
}

Brad Morgan committed
56 57 58
/*
 * Create a git protocol request.
 *
Brad Morgan committed
59
 * For example: git-upload-pack '/libgit2/libgit2'
Brad Morgan committed
60
 */
61
static int gen_proto(git_buf *request, const char *cmd, const char *url)
Brad Morgan committed
62
{
63
	char *repo;
64
	int len;
65

66 67 68
	if (!git__prefixcmp(url, prefix_ssh)) {
		url = url + strlen(prefix_ssh);
		repo = strchr(url, '/');
69 70
		if (repo && repo[1] == '~')
			++repo;
71 72
	} else {
		repo = strchr(url, ':');
73
		if (repo) repo++;
74
	}
75

76
	if (!repo) {
77
		giterr_set(GITERR_NET, "Malformed git protocol URL");
78 79
		return -1;
	}
80

81
	len = strlen(cmd) + 1 /* Space */ + 1 /* Quote */ + strlen(repo) + 1 /* Quote */ + 1;
82

Brad Morgan committed
83
	git_buf_grow(request, len);
Brad Morgan committed
84
	git_buf_printf(request, "%s '%s'", cmd, repo);
Brad Morgan committed
85
	git_buf_putc(request, '\0');
86

Brad Morgan committed
87 88
	if (git_buf_oom(request))
		return -1;
89

Brad Morgan committed
90 91 92
	return 0;
}

Brad Morgan committed
93
static int send_command(ssh_stream *s)
Brad Morgan committed
94 95 96
{
	int error;
	git_buf request = GIT_BUF_INIT;
97

98
	error = gen_proto(&request, s->cmd, s->url);
Brad Morgan committed
99 100
	if (error < 0)
		goto cleanup;
101

102
	error = libssh2_channel_exec(s->channel, request.ptr);
103 104
	if (error < LIBSSH2_ERROR_NONE) {
		ssh_error(s->session, "SSH could not execute request");
Brad Morgan committed
105
		goto cleanup;
106
	}
107

Brad Morgan committed
108
	s->sent_command = 1;
109

Brad Morgan committed
110 111 112 113 114
cleanup:
	git_buf_free(&request);
	return error;
}

Brad Morgan committed
115 116 117 118 119
static int ssh_stream_read(
	git_smart_subtransport_stream *stream,
	char *buffer,
	size_t buf_size,
	size_t *bytes_read)
Brad Morgan committed
120
{
121
	int rc;
Brad Morgan committed
122
	ssh_stream *s = (ssh_stream *)stream;
123

Brad Morgan committed
124
	*bytes_read = 0;
125

Brad Morgan committed
126 127
	if (!s->sent_command && send_command(s) < 0)
		return -1;
128

129
	if ((rc = libssh2_channel_read(s->channel, buffer, buf_size)) < LIBSSH2_ERROR_NONE) {
130
		ssh_error(s->session, "SSH could not read data");
Brad Morgan committed
131
		return -1;
132
	}
133

134 135 136 137 138
	/*
	 * If we can't get anything out of stdout, it's typically a
	 * not-found error, so read from stderr and signal EOF on
	 * stderr.
	 */
139 140
	if (rc == 0 && (rc = libssh2_channel_read_stderr(s->channel, buffer, buf_size)) > 0) {
		giterr_set(GITERR_SSH, "%*s", rc, buffer);
141
		return GIT_EEOF;
142 143 144
	}


Brad Morgan committed
145
	*bytes_read = rc;
146

Brad Morgan committed
147 148 149
	return 0;
}

Brad Morgan committed
150 151 152 153
static int ssh_stream_write(
	git_smart_subtransport_stream *stream,
	const char *buffer,
	size_t len)
Brad Morgan committed
154
{
Brad Morgan committed
155
	ssh_stream *s = (ssh_stream *)stream;
156 157
	size_t off = 0;
	ssize_t ret = 0;
158

Brad Morgan committed
159 160
	if (!s->sent_command && send_command(s) < 0)
		return -1;
161

162 163 164 165 166 167 168 169 170 171
	do {
		ret = libssh2_channel_write(s->channel, buffer + off, len - off);
		if (ret < 0)
			break;

		off += ret;

	} while (off < len);

	if (ret < 0) {
172
		ssh_error(s->session, "SSH could not write data");
Brad Morgan committed
173 174
		return -1;
	}
175

176
	return 0;
Brad Morgan committed
177 178
}

Brad Morgan committed
179
static void ssh_stream_free(git_smart_subtransport_stream *stream)
Brad Morgan committed
180
{
Brad Morgan committed
181
	ssh_stream *s = (ssh_stream *)stream;
182
	ssh_subtransport *t;
183

184 185
	if (!stream)
		return;
186

187
	t = OWNING_SUBTRANSPORT(s);
Brad Morgan committed
188
	t->current_stream = NULL;
189

Brad Morgan committed
190 191
	if (s->channel) {
		libssh2_channel_close(s->channel);
192 193
		libssh2_channel_free(s->channel);
		s->channel = NULL;
Brad Morgan committed
194
	}
195

Brad Morgan committed
196
	if (s->session) {
197 198
		libssh2_session_free(s->session);
		s->session = NULL;
Brad Morgan committed
199
	}
200

201 202 203 204
	if (s->io) {
		git_stream_close(s->io);
		git_stream_free(s->io);
		s->io = NULL;
Brad Morgan committed
205
	}
206

Brad Morgan committed
207 208 209 210
	git__free(s->url);
	git__free(s);
}

Brad Morgan committed
211 212 213 214 215
static int ssh_stream_alloc(
	ssh_subtransport *t,
	const char *url,
	const char *cmd,
	git_smart_subtransport_stream **stream)
Brad Morgan committed
216
{
Brad Morgan committed
217
	ssh_stream *s;
218

219
	assert(stream);
220

Brad Morgan committed
221
	s = git__calloc(sizeof(ssh_stream), 1);
Brad Morgan committed
222
	GITERR_CHECK_ALLOC(s);
223

Brad Morgan committed
224
	s->parent.subtransport = &t->parent;
Brad Morgan committed
225 226 227
	s->parent.read = ssh_stream_read;
	s->parent.write = ssh_stream_write;
	s->parent.free = ssh_stream_free;
228

Brad Morgan committed
229
	s->cmd = cmd;
230

231
	s->url = git__strdup(url);
Brad Morgan committed
232 233 234 235
	if (!s->url) {
		git__free(s);
		return -1;
	}
236

Brad Morgan committed
237 238 239 240
	*stream = &s->parent;
	return 0;
}

241
static int git_ssh_extract_url_parts(
Brad Morgan committed
242 243 244 245 246 247
	char **host,
	char **username,
	const char *url)
{
	char *colon, *at;
	const char *start;
248

249
	colon = strchr(url, ':');
250 251


252
	at = strchr(url, '@');
Brad Morgan committed
253
	if (at) {
Etienne Samson committed
254
		start = at + 1;
Brad Morgan committed
255
		*username = git__substrdup(url, at - url);
256
		GITERR_CHECK_ALLOC(*username);
Brad Morgan committed
257
	} else {
258
		start = url;
259
		*username = NULL;
Brad Morgan committed
260
	}
261

262 263 264 265 266
	if (colon == NULL || (colon < start)) {
		giterr_set(GITERR_NET, "Malformed URL");
		return -1;
	}

Brad Morgan committed
267
	*host = git__substrdup(start, colon - start);
268
	GITERR_CHECK_ALLOC(*host);
269

Brad Morgan committed
270 271 272
	return 0;
}

273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298
static int ssh_agent_auth(LIBSSH2_SESSION *session, git_cred_ssh_key *c) {
	int rc = LIBSSH2_ERROR_NONE;

	struct libssh2_agent_publickey *curr, *prev = NULL;

	LIBSSH2_AGENT *agent = libssh2_agent_init(session);

	if (agent == NULL)
		return -1;

	rc = libssh2_agent_connect(agent);

	if (rc != LIBSSH2_ERROR_NONE)
		goto shutdown;

	rc = libssh2_agent_list_identities(agent);

	if (rc != LIBSSH2_ERROR_NONE)
		goto shutdown;

	while (1) {
		rc = libssh2_agent_get_identity(agent, &curr, prev);

		if (rc < 0)
			goto shutdown;

299 300 301 302 303 304
		/* rc is set to 1 whenever the ssh agent ran out of keys to check.
		 * Set the error code to authentication failure rather than erroring
		 * out with an untranslatable error code.
		 */
		if (rc == 1) {
			rc = LIBSSH2_ERROR_AUTHENTICATION_FAILED;
305
			goto shutdown;
306
		}
307 308 309 310 311 312 313 314 315 316

		rc = libssh2_agent_userauth(agent, c->username, curr);

		if (rc == 0)
			break;

		prev = curr;
	}

shutdown:
317 318 319 320

	if (rc != LIBSSH2_ERROR_NONE)
		ssh_error(session, "error authenticating");

321 322 323 324 325 326
	libssh2_agent_disconnect(agent);
	libssh2_agent_free(agent);

	return rc;
}

327 328
static int _git_ssh_authenticate_session(
	LIBSSH2_SESSION* session,
329
	git_cred* cred)
330 331
{
	int rc;
332

333
	do {
334
		giterr_clear();
335
		switch (cred->credtype) {
336 337
		case GIT_CREDTYPE_USERPASS_PLAINTEXT: {
			git_cred_userpass_plaintext *c = (git_cred_userpass_plaintext *)cred;
338
			rc = libssh2_userauth_password(session, c->username, c->password);
339 340
			break;
		}
341 342
		case GIT_CREDTYPE_SSH_KEY: {
			git_cred_ssh_key *c = (git_cred_ssh_key *)cred;
343 344 345 346 347 348 349 350

			if (c->privatekey)
				rc = libssh2_userauth_publickey_fromfile(
					session, c->username, c->publickey,
					c->privatekey, c->passphrase);
			else
				rc = ssh_agent_auth(session, c);

351 352
			break;
		}
353 354
		case GIT_CREDTYPE_SSH_CUSTOM: {
			git_cred_ssh_custom *c = (git_cred_ssh_custom *)cred;
355

356
			rc = libssh2_userauth_publickey(
357
				session, c->username, (const unsigned char *)c->publickey,
358
				c->publickey_len, c->sign_callback, &c->payload);
359 360
			break;
		}
361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381
		case GIT_CREDTYPE_SSH_INTERACTIVE: {
			void **abstract = libssh2_session_abstract(session);
			git_cred_ssh_interactive *c = (git_cred_ssh_interactive *)cred;

			/* ideally, we should be able to set this by calling
			 * libssh2_session_init_ex() instead of libssh2_session_init().
			 * libssh2's API is inconsistent here i.e. libssh2_userauth_publickey()
			 * allows you to pass the `abstract` as part of the call, whereas
			 * libssh2_userauth_keyboard_interactive() does not!
			 *
			 * The only way to set the `abstract` pointer is by calling
			 * libssh2_session_abstract(), which will replace the existing
			 * pointer as is done below. This is safe for now (at time of writing),
			 * but may not be valid in future.
			 */
			*abstract = c->payload;

			rc = libssh2_userauth_keyboard_interactive(
				session, c->username, c->prompt_callback);
			break;
		}
382 383 384 385
#ifdef GIT_SSH_MEMORY_CREDENTIALS
		case GIT_CREDTYPE_SSH_MEMORY: {
			git_cred_ssh_key *c = (git_cred_ssh_key *)cred;

386 387 388
			assert(c->username);
			assert(c->privatekey);

389 390 391 392 393
			rc = libssh2_userauth_publickey_frommemory(
				session,
				c->username,
				strlen(c->username),
				c->publickey,
394
				c->publickey ? strlen(c->publickey) : 0,
395 396 397 398 399 400
				c->privatekey,
				strlen(c->privatekey),
				c->passphrase);
			break;
		}
#endif
401 402
		default:
			rc = LIBSSH2_ERROR_AUTHENTICATION_FAILED;
403
		}
Etienne Samson committed
404
	} while (LIBSSH2_ERROR_EAGAIN == rc || LIBSSH2_ERROR_TIMEOUT == rc);
405

406 407 408
        if (rc == LIBSSH2_ERROR_PASSWORD_EXPIRED || rc == LIBSSH2_ERROR_AUTHENTICATION_FAILED)
                return GIT_EAUTH;

409
	if (rc != LIBSSH2_ERROR_NONE) {
410 411
		if (!giterr_last())
			ssh_error(session, "Failed to authenticate SSH session");
412 413 414 415
		return -1;
	}

	return 0;
416 417
}

418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443
static int request_creds(git_cred **out, ssh_subtransport *t, const char *user, int auth_methods)
{
	int error, no_callback = 0;
	git_cred *cred = NULL;

	if (!t->owner->cred_acquire_cb) {
		no_callback = 1;
	} else {
		error = t->owner->cred_acquire_cb(&cred, t->owner->url, user, auth_methods,
						  t->owner->cred_acquire_payload);

		if (error == GIT_PASSTHROUGH)
			no_callback = 1;
		else if (error < 0)
			return error;
		else if (!cred) {
			giterr_set(GITERR_SSH, "Callback failed to initialize SSH credentials");
			return -1;
		}
	}

	if (no_callback) {
		giterr_set(GITERR_SSH, "authentication required but no callback set");
		return -1;
	}

444 445 446 447 448 449
	if (!(cred->credtype & auth_methods)) {
		cred->free(cred);
		giterr_set(GITERR_SSH, "callback returned unsupported credentials type");
		return -1;
	}

450 451 452 453 454
	*out = cred;

	return 0;
}

Etienne Samson committed
455
static int _git_ssh_session_create(
Brad Morgan committed
456
	LIBSSH2_SESSION** session,
457
	git_stream *io)
Brad Morgan committed
458
{
459 460
	int rc = 0;
	LIBSSH2_SESSION* s;
461
	git_socket_stream *socket = (git_socket_stream *) io;
462

463 464 465 466 467
	assert(session);

	s = libssh2_session_init();
	if (!s) {
		giterr_set(GITERR_NET, "Failed to initialize SSH session");
Etienne Samson committed
468
		return -1;
469
	}
470

Etienne Samson committed
471
	do {
472
		rc = libssh2_session_startup(s, socket->s);
Etienne Samson committed
473
	} while (LIBSSH2_ERROR_EAGAIN == rc || LIBSSH2_ERROR_TIMEOUT == rc);
474

475 476
	if (rc != LIBSSH2_ERROR_NONE) {
		ssh_error(s, "Failed to start SSH session");
477 478
		libssh2_session_free(s);
		return -1;
479
	}
480

Brad Morgan committed
481
	libssh2_session_set_blocking(s, 1);
482

Brad Morgan committed
483
	*session = s;
484

Brad Morgan committed
485 486 487
	return 0;
}

Brad Morgan committed
488
static int _git_ssh_setup_conn(
Brad Morgan committed
489 490
	ssh_subtransport *t,
	const char *url,
Brad Morgan committed
491
	const char *cmd,
492
	git_smart_subtransport_stream **stream)
Brad Morgan committed
493
{
Ben Straub committed
494
	char *host=NULL, *port=NULL, *path=NULL, *user=NULL, *pass=NULL;
Brad Morgan committed
495
	const char *default_port="22";
496
	int auth_methods, error = 0;
Brad Morgan committed
497
	ssh_stream *s;
498
	git_cred *cred = NULL;
Brad Morgan committed
499 500
	LIBSSH2_SESSION* session=NULL;
	LIBSSH2_CHANNEL* channel=NULL;
501

502 503
	t->current_stream = NULL;

Brad Morgan committed
504
	*stream = NULL;
Brad Morgan committed
505
	if (ssh_stream_alloc(t, url, cmd, stream) < 0)
Brad Morgan committed
506
		return -1;
507

Brad Morgan committed
508
	s = (ssh_stream *)*stream;
509 510
	s->session = NULL;
	s->channel = NULL;
511

512
	if (!git__prefixcmp(url, prefix_ssh)) {
513
		if ((error = gitno_extract_url_parts(&host, &port, &path, &user, &pass, url, default_port)) < 0)
514
			goto done;
515
	} else {
516
		if ((error = git_ssh_extract_url_parts(&host, &user, url)) < 0)
517
			goto done;
518
		port = git__strdup(default_port);
Brad Morgan committed
519
		GITERR_CHECK_ALLOC(port);
520
	}
521

522 523
	if ((error = git_socket_stream_new(&s->io, host, port)) < 0 ||
	    (error = git_stream_connect(s->io)) < 0)
524
		goto done;
525

526
	if ((error = _git_ssh_session_create(&session, s->io)) < 0)
527
		goto done;
528 529

	if (t->owner->certificate_check_cb != NULL) {
530
		git_cert_hostkey cert = {{ 0 }}, *cert_ptr;
531 532
		const char *key;

533
		cert.parent.cert_type = GIT_CERT_HOSTKEY_LIBSSH2;
534

535 536
		key = libssh2_hostkey_hash(session, LIBSSH2_HOSTKEY_HASH_SHA1);
		if (key != NULL) {
537 538
			cert.type |= GIT_CERT_SSH_SHA1;
			memcpy(&cert.hash_sha1, key, 20);
539 540
		}

541 542 543 544 545 546 547
		key = libssh2_hostkey_hash(session, LIBSSH2_HOSTKEY_HASH_MD5);
		if (key != NULL) {
			cert.type |= GIT_CERT_SSH_MD5;
			memcpy(&cert.hash_md5, key, 16);
		}

		if (cert.type == 0) {
548
			giterr_set(GITERR_SSH, "unable to get the host key");
549 550
			error = -1;
			goto done;
551 552 553
		}

		/* We don't currently trust any hostkeys */
554
		giterr_clear();
555 556 557 558

		cert_ptr = &cert;

		error = t->owner->certificate_check_cb((git_cert *) cert_ptr, 0, host, t->owner->message_cb_payload);
559 560 561 562
		if (error < 0) {
			if (!giterr_last())
				giterr_set(GITERR_NET, "user cancelled hostkey check");

563
			goto done;
564
		}
565
	}
566

567 568 569
	/* we need the username to ask for auth methods */
	if (!user) {
		if ((error = request_creds(&cred, t, NULL, GIT_CREDTYPE_USERNAME)) < 0)
570
			goto done;
571

572 573 574 575
		user = git__strdup(((git_cred_username *) cred)->username);
		cred->free(cred);
		cred = NULL;
		if (!user)
576
			goto done;
577
	} else if (user && pass) {
578
		if ((error = git_cred_userpass_plaintext_new(&cred, user, pass)) < 0)
579
			goto done;
580 581
	}

582
	if ((error = list_auth_methods(&auth_methods, session, user)) < 0)
583
		goto done;
584

585 586
	error = GIT_EAUTH;
	/* if we already have something to try */
587
	if (cred && auth_methods & cred->credtype)
588
		error = _git_ssh_authenticate_session(session, cred);
589

590 591 592 593 594 595 596
	while (error == GIT_EAUTH) {
		if (cred) {
			cred->free(cred);
			cred = NULL;
		}

		if ((error = request_creds(&cred, t, user, auth_methods)) < 0)
597
			goto done;
598

599 600 601
		if (strcmp(user, git_cred__username(cred))) {
			giterr_set(GITERR_SSH, "username does not match previous request");
			error = -1;
602
			goto done;
603 604
		}

605 606
		error = _git_ssh_authenticate_session(session, cred);
	}
607

608
	if (error < 0)
609
		goto done;
610

Brad Morgan committed
611
	channel = libssh2_channel_open_session(session);
612
	if (!channel) {
613
		error = -1;
614
		ssh_error(session, "Failed to open SSH channel");
615
		goto done;
616
	}
617

Brad Morgan committed
618
	libssh2_channel_set_blocking(channel, 1);
619

Brad Morgan committed
620 621
	s->session = session;
	s->channel = channel;
622

Brad Morgan committed
623
	t->current_stream = s;
624

625 626
done:
	if (error < 0) {
627
		ssh_stream_free(*stream);
628

629 630 631
		if (session)
			libssh2_session_free(session);
	}
632

633 634 635
	if (cred)
		cred->free(cred);

Brad Morgan committed
636
	git__free(host);
Brad Morgan committed
637
	git__free(port);
638
	git__free(path);
Brad Morgan committed
639 640 641
	git__free(user);
	git__free(pass);

642
	return error;
Brad Morgan committed
643 644
}

Brad Morgan committed
645
static int ssh_uploadpack_ls(
Brad Morgan committed
646 647 648 649
	ssh_subtransport *t,
	const char *url,
	git_smart_subtransport_stream **stream)
{
650 651
	const char *cmd = t->cmd_uploadpack ? t->cmd_uploadpack : cmd_uploadpack;

652
	return _git_ssh_setup_conn(t, url, cmd, stream);
Brad Morgan committed
653 654
}

Brad Morgan committed
655
static int ssh_uploadpack(
Brad Morgan committed
656 657 658 659 660
	ssh_subtransport *t,
	const char *url,
	git_smart_subtransport_stream **stream)
{
	GIT_UNUSED(url);
661

Brad Morgan committed
662 663 664 665
	if (t->current_stream) {
		*stream = &t->current_stream->parent;
		return 0;
	}
666

Brad Morgan committed
667 668 669 670
	giterr_set(GITERR_NET, "Must call UPLOADPACK_LS before UPLOADPACK");
	return -1;
}

Brad Morgan committed
671
static int ssh_receivepack_ls(
Brad Morgan committed
672 673 674 675
	ssh_subtransport *t,
	const char *url,
	git_smart_subtransport_stream **stream)
{
676 677
	const char *cmd = t->cmd_receivepack ? t->cmd_receivepack : cmd_receivepack;

678

679
	return _git_ssh_setup_conn(t, url, cmd, stream);
Brad Morgan committed
680 681
}

Brad Morgan committed
682
static int ssh_receivepack(
Brad Morgan committed
683 684 685
	ssh_subtransport *t,
	const char *url,
	git_smart_subtransport_stream **stream)
Brad Morgan committed
686 687
{
	GIT_UNUSED(url);
688

Brad Morgan committed
689 690 691 692
	if (t->current_stream) {
		*stream = &t->current_stream->parent;
		return 0;
	}
693

Brad Morgan committed
694 695 696 697
	giterr_set(GITERR_NET, "Must call RECEIVEPACK_LS before RECEIVEPACK");
	return -1;
}

Brad Morgan committed
698
static int _ssh_action(
Brad Morgan committed
699 700 701 702
	git_smart_subtransport_stream **stream,
	git_smart_subtransport *subtransport,
	const char *url,
	git_smart_service_t action)
Brad Morgan committed
703 704
{
	ssh_subtransport *t = (ssh_subtransport *) subtransport;
705

Brad Morgan committed
706 707
	switch (action) {
		case GIT_SERVICE_UPLOADPACK_LS:
Brad Morgan committed
708
			return ssh_uploadpack_ls(t, url, stream);
709

Brad Morgan committed
710
		case GIT_SERVICE_UPLOADPACK:
Brad Morgan committed
711
			return ssh_uploadpack(t, url, stream);
712

Brad Morgan committed
713
		case GIT_SERVICE_RECEIVEPACK_LS:
Brad Morgan committed
714
			return ssh_receivepack_ls(t, url, stream);
715

Brad Morgan committed
716
		case GIT_SERVICE_RECEIVEPACK:
Brad Morgan committed
717
			return ssh_receivepack(t, url, stream);
Brad Morgan committed
718
	}
719

Brad Morgan committed
720 721 722 723
	*stream = NULL;
	return -1;
}

Brad Morgan committed
724
static int _ssh_close(git_smart_subtransport *subtransport)
Brad Morgan committed
725 726
{
	ssh_subtransport *t = (ssh_subtransport *) subtransport;
727

Brad Morgan committed
728
	assert(!t->current_stream);
729

Brad Morgan committed
730
	GIT_UNUSED(t);
731

Brad Morgan committed
732 733 734
	return 0;
}

Brad Morgan committed
735
static void _ssh_free(git_smart_subtransport *subtransport)
Brad Morgan committed
736 737
{
	ssh_subtransport *t = (ssh_subtransport *) subtransport;
738

Brad Morgan committed
739
	assert(!t->current_stream);
740

741 742
	git__free(t->cmd_uploadpack);
	git__free(t->cmd_receivepack);
Brad Morgan committed
743 744
	git__free(t);
}
745 746 747 748 749

#define SSH_AUTH_PUBLICKEY "publickey"
#define SSH_AUTH_PASSWORD "password"
#define SSH_AUTH_KEYBOARD_INTERACTIVE "keyboard-interactive"

750
static int list_auth_methods(int *out, LIBSSH2_SESSION *session, const char *username)
751 752 753 754 755
{
	const char *list, *ptr;

	*out = 0;

756
	list = libssh2_userauth_list(session, username, strlen(username));
757 758

	/* either error, or the remote accepts NONE auth, which is bizarre, let's punt */
759 760
	if (list == NULL && !libssh2_userauth_authenticated(session))
		return -1;
761 762 763 764 765 766 767 768 769

	ptr = list;
	while (ptr) {
		if (*ptr == ',')
			ptr++;

		if (!git__prefixcmp(ptr, SSH_AUTH_PUBLICKEY)) {
			*out |= GIT_CREDTYPE_SSH_KEY;
			*out |= GIT_CREDTYPE_SSH_CUSTOM;
770 771 772
#ifdef GIT_SSH_MEMORY_CREDENTIALS
			*out |= GIT_CREDTYPE_SSH_MEMORY;
#endif
773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794
			ptr += strlen(SSH_AUTH_PUBLICKEY);
			continue;
		}

		if (!git__prefixcmp(ptr, SSH_AUTH_PASSWORD)) {
			*out |= GIT_CREDTYPE_USERPASS_PLAINTEXT;
			ptr += strlen(SSH_AUTH_PASSWORD);
			continue;
		}

		if (!git__prefixcmp(ptr, SSH_AUTH_KEYBOARD_INTERACTIVE)) {
			*out |= GIT_CREDTYPE_SSH_INTERACTIVE;
			ptr += strlen(SSH_AUTH_KEYBOARD_INTERACTIVE);
			continue;
		}

		/* Skipt it if we don't know it */
		ptr = strchr(ptr, ',');
	}

	return 0;
}
795
#endif
Brad Morgan committed
796

797
int git_smart_subtransport_ssh(
798
	git_smart_subtransport **out, git_transport *owner, void *param)
Brad Morgan committed
799
{
800
#ifdef GIT_SSH
Brad Morgan committed
801
	ssh_subtransport *t;
802 803 804

	assert(out);

805 806
	GIT_UNUSED(param);

Brad Morgan committed
807 808
	t = git__calloc(sizeof(ssh_subtransport), 1);
	GITERR_CHECK_ALLOC(t);
809

Brad Morgan committed
810
	t->owner = (transport_smart *)owner;
Brad Morgan committed
811 812 813
	t->parent.action = _ssh_action;
	t->parent.close = _ssh_close;
	t->parent.free = _ssh_free;
814

Brad Morgan committed
815 816
	*out = (git_smart_subtransport *) t;
	return 0;
817 818
#else
	GIT_UNUSED(owner);
819
	GIT_UNUSED(param);
820 821 822

	assert(out);
	*out = NULL;
823

824 825
	giterr_set(GITERR_INVALID, "Cannot create SSH transport. Library was built without SSH support");
	return -1;
826
#endif
827
}
828 829 830 831 832 833 834 835 836 837 838 839

int git_transport_ssh_with_paths(git_transport **out, git_remote *owner, void *payload)
{
#ifdef GIT_SSH
	git_strarray *paths = (git_strarray *) payload;
	git_transport *transport;
	transport_smart *smart;
	ssh_subtransport *t;
	int error;
	git_smart_subtransport_definition ssh_definition = {
		git_smart_subtransport_ssh,
		0, /* no RPC */
840
		NULL,
841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862
	};

	if (paths->count != 2) {
		giterr_set(GITERR_SSH, "invalid ssh paths, must be two strings");
		return GIT_EINVALIDSPEC;
	}

	if ((error = git_transport_smart(&transport, owner, &ssh_definition)) < 0)
		return error;

	smart = (transport_smart *) transport;
	t = (ssh_subtransport *) smart->wrapped;

	t->cmd_uploadpack = git__strdup(paths->strings[0]);
	GITERR_CHECK_ALLOC(t->cmd_uploadpack);
	t->cmd_receivepack = git__strdup(paths->strings[1]);
	GITERR_CHECK_ALLOC(t->cmd_receivepack);

	*out = transport;
	return 0;
#else
	GIT_UNUSED(owner);
Vicent Marti committed
863
	GIT_UNUSED(payload);
864 865 866 867 868 869 870 871

	assert(out);
	*out = NULL;

	giterr_set(GITERR_INVALID, "Cannot create SSH transport. Library was built without SSH support");
	return -1;
#endif
}